

Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days
Jul 25, 2025
A critical vulnerability in Microsoft SharePoint sparks national security concerns, with state-sponsored hackers exploiting faulty patches. The discussion highlights the chaotic landscape of cybersecurity practices and the challenges posed by outdated collaboration tools. Privacy issues are further scrutinized, including Microsoft’s past responses to data exposures. Plus, a humorous, cautionary tale unfolds about AI mishaps in coding, underscoring the need for robust protocols in tech development. Insights on consciousness and its links to language also provide a thought-provoking twist.
AI Snips
Chapters
Books
Transcript
Episode notes
Don't Expose SharePoint to Internet
- Avoid exposing SharePoint servers directly to the internet; it was designed for local networks only.
- Always place SharePoint behind VPN and restrict access to authenticated users only for security.
Microsoft Patch Struggles Prolong Risks
- Microsoft's SharePoint vulnerabilities have a messy patch timeline with trivial bypasses, prolonging exploitation.
- They struggle with patch quality, which invites ransomware and nation state exploitation on on-prem installations.
Patching Isn’t Enough for SharePoint
- Patching SharePoint alone isn't enough; servers must be restarted and critical secrets like machine keys changed.
- Attackers stealing machine keys can regain access even after patching, revealing a core security flaw.